Use It

Is Someone Spying on Your Phone?

You probably know there are plenty of apps you can install on your smartphone to track its location in case it gets lost or stolen. Apple's “Find My iPhone” is one good one and many security apps, such as AVG Mobilation, can track down a phone in seconds.

But what if someone else is tracking you? Is there any chance your boss or spouse could be spying on everything you do on your phone?

It’s easy to do. Spy apps are plentiful and can imperceptibly track text and e-mail messages, location, Web sites you visit, who you call and what photos and videos you shoot. The problem is these apps are difficult to detect and run invisibly in the background.

I decided to track my son and installed an app on his phone called Phone Control by Laucass (free on Google Play). Of course, secretly intercepting electronic communications without the person's knowledge and consent is illegal, so I told my son I was doing it and that I’d only use it if I had good reason.

Every day I receive emails that indicate my son’s location as he’s using his phone out in the world. I can click on those links in my email to see via Google Maps where he is (although I very rarely do). I could also set up the app to send me data about everything else he’s doing on his phone, but that’s not something I personally need—or want—to do.

Signs your phone may have been compromised

Someone borrowed or took your phone

I had to have my son’s phone in hand to install Android Phone Control. Once activated, however, there’s no icon in the application launcher. The app shows up with the name “Android System” in the applications manager so it doesn’t look suspicious. If you think someone could do something like this when you’re not paying attention or asleep, secure your phone with a passcode that isn’t easy to guess.

(Editor's Note 9/26/12: To confirm you have the spyware and not a standard Android app by the same name, follow these steps to open the spy app (dial the phone number.)

(Editor's Note 12/16/14 (Josh Kirschner): In some of my comments below, I noted the unlikelihood of spying on iPhones that were not jailbroken. However, since many of those comments were made, certain holes were identified in iOS that exploit the iPhone's connection to trusted networks and devices to allow someone with access to the network or device to download significant amounts of personal data. Jailbreaking the iPhone was not required. Fortunately, those holes have been patched in iOS 8. For more information, see: http://www.zdziarski.com/blog/?p=3820]

Your phone is acting weirdly

Taking forever to shut off, lighting up for no reason, suddenly getting much shorter battery life or running hot when you’re not using it may indicate hidden processes are running in the background.

Your data usage skyrockets for no reason

This could be because your phone is checking in with someone else, using GPS and sending them text messages or emails that communicate where you are and what you’re doing.

What to do if you suspect your phone's being monitored

The best thing to do is perform a factory reset, which you can find as an option in your phone’s settings. Know, however, that in doing so you will lose all data stored on your phone, so back it up first.

If you’re using Apple iCloud or Android 4.0, items like your contacts, photos and music are automatically synced and saved in the cloud. But if you have an older phone, you’ll want to make sure to export your contacts before doing a factory reset. There are various ways to do this depending on what phone you’re using and which operating system it’s running. If you’re not sure, get help from your cellular provider; they can make sure to retain your contacts and other important data during a factory reset.

You'll then want to use a strong passcode to prevent unauthorized access to your device. For Android devices, you can also install an app, like AppNotifier (free on Google Play), that will email you when programs are loaded onto your phone.

You'll then have to tackle the issue of who's doing the monitoring. Keep in mind that if your device was issued by your company or is authorized to access your company's email and other data services, you may have given your consent as part of your employment contract or when access was data access was granted.

suggestions please

From Me on May 02, 2012 :: 3:56 am

Kevin you defintely understand, and its a relief for people like me to know there are people like you who see and want to help. My problem is my resources are limited and I am not that tech savey. I suppose thats why they are able to mess with me. How does my phone end up being a speaker when its off. This past year I have bought over 20 burn phones. I try to not let my number out but they get it? Advice please

same problem i have my phone bugged just about every weekend with out fail and yep :( iv been throug

From dolmio on October 21, 2012 :: 8:51 pm

hey guys…..sooo whats the best solution to people bugging our phones/smartphones…... i see and realized a while ago the best and most approachable way is to find the criminal that done the crime and thats correct, i ant no police/goverment fan but this is pure nonsense with bugging peoples personal devices, iv forgot to mention some of us pay top dollar for out smartphone and tablets and in the end all we want to or should do is get rid off it as there seems to be no easy sollution???? apart from parents with kids thats acceptable to a certain aeo but still i think there needs t… is there a program for iphones and ipads to give them a 0 im infected or a 0 all good?..... iv never seen or heard if such a program i could run on my pcor device to test or all these new modern warfare technology…....chees Damo:D

What??

Come On

How?

From vibrant77 on July 01, 2012 :: 7:25 pm

I recently discovered I may have been a victim if illegal invasion of privacy by an ex friend who did have access to my phone when I visited their house last year. But, how do I go about prosecuting, and proving they did it?Its easier said than done

HELP

From Caren on August 13, 2012 :: 9:09 pm

I need help. ok, so heres how the story goes. One day a man came to my door and claims my husband of 20 years is seeing his girlfriend. I looked on his cell bill and he was getting alot of blocked calls. This also happened while I was in the truck with him and he would not answer.So I secretly placed a block on his cell and now no more blocked calls can come thru. The very next day he began calling this number 931-315-9988. I tried to search this number but nothing. about ten times a day he dials this number.I tried to call it but I cannot get thru. I have had about four other people try, they cannot get thru. But My husband continues to call this number daily. Can you call a number but it be blocked to all other phones? Could he be spying on me? Could it be a calling card? What is this crazy number that only he can call?

You should....

From Lucy on October 14, 2012 :: 12:09 pm

Why don’t you track your husband using GPS on his phone?. This way you would have tangible proof of what’s going on?. Because at this point there is only what that man at your doorstep said. I also suggest check his credit cards statements, bank accounts, receipts. That ougth to give you a clue of what’s goin on?. I truly hope is something else for your own good.

HELP From Caren on August 13, 2012 :: 9:09 pm

From Me on November 17, 2012 :: 11:57 pm

Hello Caren. Blocked calls are exactly that. You can manage blocked calls. You can also White list a number. meaning you can Block all calls except who you want. In the age of digital options are only a click away. I get telemarketer calls all hours of the night and day. I put them in a Telemarketers Contact. then I click Block ALL calls for these numbers. This is an option of Android not iPhone. There are apps to do this. however, You can create a contact called BLOCKED. It’s the name of someone, not the actual Caller ID.

Cell Phone Debugging

From Carol on March 30, 2012 :: 10:10 am

Can the cheap dollar store cell phones be bugged? As far as I know they do not have a GPS or WiFi.
Just a note: You can know who the criminal is but getting the law onto him is another matter entirely—the law will not work for you if you are a woman and it is your ex-husband or soon to be ex who is doing the bugging. I know this from experience.

relieved

From Brooke McManus on March 19, 2014 :: 12:44 am

I am absolutely thrilled to have randomly came across this site! I previously wrote and in great detail gave an overview of the technical difficulties ive been experiencing since day one with my samsung galaxy s3. It was mentioned to let them hand it to you on a silver platter and you have no idea the patience,calm,and restrain I have to be about this. I didnt at first know what to make of the technical issues I was experiencing with my phone but then I realized ok…,this isnt some freak happenings so I have been doing my homework and reseach and im keeping my mouth shut because they mesed with the wrong chick and im just going to keep letting them all hang themselves! I must admit Im pretty damn good at this P.I. /sherlockholmes extra curricular activity I am involved in.

Cell phone security

Always amazed at the # of responses to this topic! “Obtaining Law enforcement assistance” only works if we assume that were not the target of a police investigation or federal investigation. Lots of folks use their mobile phones to shop, thereby opening themselves up to identity theft….(Speaking as a former U.S. Amy officer with time in “Special Operations”) I’m very careful how and where I shop on-line…everyone has to be…

Kismet!

I was given a phone last week to review. I just read your article, looked at the apps and there it was. I was stunned. I did the factory reset. But since they gave me the phone, could they just reinstall it? What’s to prevent that from happening again? Of course, I’m no longer doing anything serious on the phone. The opposite of what they expect from a reviewer. Duh.

iPhones?

From mzdf on April 28, 2012 :: 11:37 pm

you speak of androids other phones..but you don’t mention iPhones directly how they can be infiltrated,stalked,bugged..and what other apps apply to the iPhone..just wondering since I have an iPhone..and what do I look for..what I can use. I would like to obtain a app for my son’s iPhone, but I won’t want one on my mine by someone else.

You gotta catch em

From Me on May 02, 2012 :: 3:50 am

It’s really a problem for some people, speaking personally. It takes 1 psycho to damage you life. You correct when it comes to reporting to the police, they look at you as if you were the crazy 1. Spending money you don’t have changing numbers is not the way to stop it. You gota catch the person doing it. The only way is to figure out who and beat them at their own game. Any suggestions please let me know, these people need to stop. With all the apps and tech their has to be something. Something that doesn’t cost. People who do stuff like that should not be allowed to have the privledge of having a cell phone or computer for 2 to 3 years.

Cell Phone Debugging

From Carol on May 02, 2012 :: 11:15 am

We found out how the shady ex kept finding a cell phone number, Day Care. This particular couple has a child in day care and they were giving the phone number to the daddy. Everytime momma would change her phone and number, she would give it to day care (naturally) and daddy would ask for it and recieved it. That has been stopped.
It’s odd though, the law has to have a subpeona to tap your phone but some crazy person, such as the ex that I mentioned, can get the same information easily. Something is wrong there.

No. The law NO LONGER

From Dlori on September 10, 2012 :: 10:54 am

No. The law NO LONGER needs a subpoena to tap your phone, your computer, find out what you read at the library, etc. We have no 4th Amendment rights anymore. For those who think the patriot act no longer exists or that it only applies to “Terrorists”, think again. Do your research.

A real problem nowadays

From Peter on June 03, 2012 :: 2:39 pm

Cellphone spying is a real problem nowadays. Today I found an Android App, which scans the device, detects the well-known spywares and also shows warnings when there are any apps that have suspicious permissions. The last one is really nice if you have any modified app with undetectable package name. Check the: https://play.google.com/store/apps/details?id=com.antispycell.free

7 phones ruined

From Joyce Dowling on June 17, 2012 :: 6:49 pm

My sister has been a victim of cell phone hacking. We know the man lives in India she met him on a chat line. No one can seem to stop him. The minute a phone enters her house he attacks it. We tried TMobile IPhone and 3 prepaid phones.One was not even in her name.
We can not figure out how he is doing this,he has never been in this country.
He takes over the phones and even seems to use them with battery out. We tried special bags purchased on internet to block cell phone signals.
She just wants a phone to keep in her car for an emergency. This maniac is stopping her.
Does anyone have any suggestions. We tried the police even US Cybercrime unit.

Can you provide more details

From Suzanne Kantra on June 18, 2012 :: 6:45 am

Can you provide more details on how he “attacks” the phones? What is happening that makes you think he has access and how do you know it is this guy in India who is doing it? I suspect something else is going on.

Re More Information

From Joyce Dowling on June 18, 2012 :: 8:40 am

My sister met this man from India on a chat line. When she realized he was strange she told him she no longer wanted to continue the conversations. He said I will never let you go. It was at that time all the contacts were removed from her phone . It was an Android phone the Apps went missing.She kept getting Text messages from him saying he was never going away. He put some sort of passcode on the phone so she was unable to dial out.
She returned this phone got a new one with a new phone number but he still got in it and placed the same locks on it. He was using the data himself and made 89 dollars worth of international phone calls that T Mobile said they can prove came from her sym card. They say it is impossible to hack their phones. The same thing happened with a verizon Iphone. The phone has never been out of her sight she has no ex husband or old boyfriend that might be doing this.
We even tried 3 different prepaid phones one which we did not even bring in her house I activated it at my hose 20 miles away. She used it 5 miles from home and he got in it.He prevented her from setting up the voice mail changed the pass code and did not allow her to send a text.
I dont know how any of this is possible. In my research I see you can by a program that will do these things but you have to know the persons phone number. We keep changing it. How could he possibly get it so quickly? The police have never heard of this. I reported him via email to Meerut police in India. He texted her and said so you turned me in to the police? I told them come to my house. This of course was impossible as we only know his phone number not his address.

Some of the things you're

Some of the things you’re describing don’t sound possible. I’m curious whether those international calls were made from India or from your home town (should be easy to tell from your phone statement).

However, if I had to make an educated guess, I would say the problem lies with your devices, not your sister’s. If your PC/email/phone were hacked, someone may be pulling down your sister’s new phone numbers from your address book or emails. That would also explain how this person may have known you emailed the Meerut police and gets access to her new phones so quickly.

I recommend that both you and your sister run Malwarebytes on your computers (download the free version here: http://www.malwarebytes.org/) and follow these instructions for what to do when you email gets hacked: http://www.techlicious.com/tip/what-to-do-when-your-email-gets-hacked/. Also, download a copy of Lookout Security or another mobile security app if you’re using Android (your phone being hacked is probably the least likely scenario, but best to be sure). And to state the obvious, make sure you’re using new passwords for the new phones and DON’T email them to each other.

Let me know what you discover.

Joyce Dowling the way the

From MyDogIsSmarterThanMe on January 11, 2014 :: 6:21 am

Joyce Dowling the way the phone is being “Hacked” is both via the SIM Card ICCID # *and* the IMEI
# Number.

IMEI = International Mobile Equipment Identity and is a unique number given to every single mobile phone

ICCID =A SIM card contains its unique serial number

Unfortunately, what you need to do is *LITERALLY* start over from the very beginning.

Pretend you never had a phone before and throw away the “Hacked One” it’s “dead forever”

The IMEI# on a cell phone is equivalent to your SSN# every single phone has it’s own IMEI#

Also, unfortunately, this number provides further details about you, the owner. There’s sites all over the web,

“Verify the Owner of the IMEI#”

The only “TRUE NEED” for this (to look up) is if you were purchasing a phone off E-Bay,etc. You can use that to see

if it’s really the phone and really the name of the person selling the phone selling to you

If the phone has been reported stolen, you’ll *typically* find here, *HOWEVER* when purchasing a phone off E-Bay,

etc. to be extra careful. because that IMEI# is unique, will provide you the Manufacturer Information,etc.

You can call the Manufacturer and verify it’s not been reported as stolen. They won’t provide any confidential

information, but they *SHOULD* at least tell you this. (Just tell them how your purchasing-why you’re verifying

To *HAVE* the Number and *NOT* asking for “Personal Info” they should be cooperative. (because unless hacked like

you’ve been, then no one should know this number.

So, that’s your solution. You need both a new Simcard and New Phone (throw the other in the trash)
(as if you try to sell, the new owner will have the same problem—thus not fair).

THE ART OF “FINESSE” A COMPLAINT TO A MANAGER.
************************************

AS for “Wrong Charges”—what you were told is Horse Manure from some front line Agent that’s trained not to give

away Credits to accounts.

What you need to do is go into the Retail Store. Just tell someone you’ve been told to ask for a Manager regarding your phone being hacked (ie. vs. “May I speak to/who is)—because again, most people are trained not to get a Manager involved unless “Serious issue”—by saying “I was told to ask to speak to a manager because my phone was hacked and need a new one”.

Take with you your Past Bills that have charges that are incorrect.

+++++++THIS IS *VITAL++++++
When speaking with a Manager, consider them your *BEST FRIEND*—-*DO NOT* use this as a person to “Complain to” (EX-don’t say “YOUR COMPANY, this/that person would not do this/that. All those type words put a Manager in a “Defensive Capacity”—anything that sounds like you’re “Challenging” the decisions that have been made in the past. WELL, because S/he’s a Manager (and probably likes their job, it’s just “human nature” to want to defend the actions your company does.

Thus be VERY POSITIVE, MAKE SURE TO USE *POSITIVE WORDS*—-not kidding, even if you have to write a script and “Practice”—-because if you mess that up, then you’ll have to go to regional VP where you WILL MOST DEFINITELY have to be “Professional” or they’ll toss you to the curb.

Tell him/her I think I know my Problem. My phone was hacked, I’ve done research on the web, I need to have this phone completely turned off/disabled/as well as the SIM Card and get all new equipment.

He/She hears that—-MORE THAN WILLING TO HELP (You’re buying something)
THE REASON—you don’t have to go into what you’ve done in the past, they’ll say what’s your account info, pull up in the CPU and “Know”/“see” you’ve done stuff in the past.

*AGAIN* be sure to tell them (based on the Internet Research) you think (because you downloaded a Rogue App) the person was able to obtain your IMEI and ICCID numbers.

Again, by using that terminology, s/he can then say I bet she’s correct.

Then, when they start with a phone *BEFORE YOU PURCHASE*, *THEN* mention, also need to discuss with you the charges made by the person that hacked your phone/getting yhour credit.

******************************

Complaining/Getting “your way” is the art of “Finesse”. If the Store Manager cannot help. I will then show you how to get District and Regional V.P. Information—which *WILL* get you what you need but an ENTIRELY DIFFERENT WAY TO HANDLE

good LUCK, I HAVE THE TRACKING TURNED ON FOR THIS QUESTION…hope you’re not gone…

wifi

From James on January 02, 2015 :: 2:45 am

Hes using your wifi. Once any of those devices connect to the wifi,he gets in. Replace your wifi router. Its the home network he has access to. That my idea.

Simple Solution

“She just wants a phone to keep in her car for an emergency.” If this is the case, just have her discontinue her cell phone service. The phone will continue to be able to dial 911 at no charge, she will cut off the harasser, and save money. Just remember to recharge the phone once in a while.

7 phones ruined

From Carol on June 18, 2012 :: 8:55 am

One solution, stop using phones for awhile. Soon the creeper will get tired of keeping an eye on her, and if she doesn’t have a phone there’s nothing to spy on. Give it a long time, say six months to a year, then try again. The creeper will have moved on by then.

How is this possible?

From Joyce Dowling on June 18, 2012 :: 7:43 pm

My sister drove to another town to pick up a track phone from our Mother. It was left to her(my Mom)as part of a good friends estate. My sister turned it on.After she had it on a few minutes the bars appeared that signaled he was in phone.By the time she drove 35 minutes home she could not reset the phone. The information in phone was changed. she had not entered her name or phone number on that phone.Is there a way that someone can physically track her?
I have run the malware scan on my PC when her IPhone said malware a month ago. I was loaded. It took a computer tech 1hour to clean it out, I now have protection. I run a scan every other day.
My sister does not own a computer that is why she had a smart phone.
I had blocked all her cell numbers from my phone so he could not call them as he had tried a couple times.
It is so bizarre but it seems all she has to do is tiuch a phone and suddenly this nut has access.

It's not

From Suzanne Kantra on June 19, 2012 :: 10:00 am

What you’re describing just isn’t possible. I’m not sure if you’re misinterpreting something as normal as cell phone reception bars as a break in attempt or there’s another disconnect between what’s actually happening and your story, but it just isn’t adding up. I suggest your sister bring her phone into the carrier’s store so they can examine it and explain to her what’s going on.

Geesh

From Me on December 03, 2014 :: 3:19 pm

How is everything not possible according to you? My husband & I are being hacked on our phones by his crazy son.. People have told me many things “aren’t possible”.. well, then how is it happening? Sprint says no one can hack our system.. yeah, of course, cause the white house was just attacked.. but sprint has much better fire walls right? Was also told someone had to have your phone to install spyware in it.. nope again.. so instead of putting this girl down and telling her that her story isn’t adding up.. try living it! Nothing makes sense.. but it’s happening.. makes you feel crazy.. then there is people like you.. that make you feel worse, say that they are lying, or making stuff up.. why would she? why would we? Hackers are obviously smart, they can do things most normal people wouldn’t think was even possible.. I wouldn’t until it actually happened to us.. so instead of putting this girl down, either help her, or don’t comment..
by the way.. how do you trace a person who hacked your phone? so we have concrete proof? any ideas on that one?

This sounds all familiar to what I'm experiencing

From Hackervictimofaloser on December 14, 2013 :: 2:38 am

Every thing you have mentioned is possible cuz it’s happening to me also everything you have mentioned., ! The reason why he is able to keep hacking and tracking you. Cuz no matter what he had hacked all your main friends or etc that you keep in contact the most also. This works like a chain reaction. Once he hacked you, he was able to act like you using your phone number to contact your sister or friends to hack them also. Trust me this is going on with my moms phone also. He would push numbers in when I was on a automated message menu for businesses. Also done it to mine on a few phone when I was talking to a couple different women each time. He also had sent me a text from my friends number portraying to be my friend. And would intercept my calls when I’m calling out or someone calling in to make the call not go though to the receiving end. But will still ring on the callers end. So the guy that keeps getting yours or your sister’s new # it’s cuz she didn’t get a new phone and number ether or your friends. I’m dealing with the same thing all cuz this guys GF told me she was single and we had sex that night. And ever since then I’ve been being followed and my computers, iPad, iPhone, android and router been getting hacked into. My iPhones contacts already gotten deleted 3 times so far. And also data’s been missing, phone freezing up and all the other signs as mentioned in many post, from all over the internet and news, OF all the signs of a tracked & hacked victims phone.. And I’m sorry to say this to the OP Suzanne Kantra but I had lookout on it and a security, anti- virus app called trustR and he bypassed both and ever since he hacked it the first time my security, anti-virus app would not scan anymore. They don’t need your phone anymore. It’s possible with just a phone number now. So it ain’t just smartphones , Even a cheaply assurance wireless phones and the others that the states give to people on food stamps or assistance.

But lately I seen up at best-buy that they had a real security and virus software specifically for iPads, iPhones iPods, and iMacs for $80..

IT IS POSSIBLE

From I.B. Stottlemyer on July 11, 2012 :: 6:16 pm

It happened to me. First if you google or search HACK,ANDROID,BLUETOOTH or HACK,iPHONE,BLUETOOTH you will see if you put your phone on wi-fi long enough for the goofball to get some malware on your phone, it hides in the simcard. Factory resets don’t work because now he has your MEID, you MAC identifier and the places you go and the sites you hang out on. Next the bluetooth is barking at your computers in your house. Most people don’t secure their bluetooth interface and a connection is made slicker than ice on an alaskan bridge. Now malware is on your laptop or home computer. You get a brand new phone and the minute you go into your house or office, you are dead again. It truely blows your mind. I thought I was loosing mine. How can I keep rebuilding windows after a low level format of the hard drive or even going to Best Buy and buying a brand new hard drive that is blank and doing an install in the woods on my laptop? Simple, once the bluetooth phone spreads the virus or malware to your machine it boroughs into the bios chips. This is where the software is located to start your computer bootstrap process. Have you ever gone to HP or Toshiba or Lenovo and downloaded the latest bios? Well if they can write to your read only memory chip so can the bad guys. It wasn’t until I completely updated the bios chip on the mother board with a new bios did I get rid of the infection. People this problem looked impossible to solve, but now that I know how it’s done it’s quite ingenious. Start with researching the cell phone hack, then suspect your blue tooth and go and try to turn it off on your computers in your house. If not, it is probably too late and your bios has been infected and so your computer keeps spreading the cheer to everyone and anything that will listen to bluetooth. Bluetooth,very very bad….Secure it folks. Stop this nonsense now.

Possible, but very unlikely

Fortunately, bluetooth hacking is not an issue anymore. All phones and laptops released over the last couple of years have updated bluetooth security that prevents pairing without the consent of the user.

According to security experts at Norton I spoke with, some of things that are described could theoretically happen, but the probability of them happening is extremely low. BIOS viruses generally have to be written to attack a specific hardware configuration, which makes them very inefficient to create and distribute. Not impossible, but also not something the average user should worry about.

Icon Picture

From Jennifer on July 16, 2012 :: 12:10 pm

Hi,
Can you describe what the icon looks like. I suspect my husband installed this in my phone. I’m not sure if it is what you’re describing. It is in the right location and it has the same name. I did reset the phone but it didn’t work.

OMG!!!

From no thank on September 26, 2012 :: 8:06 pm

My phone has the Android System thing in the application manager! How do i find out who is spying on me?? or when this was installed? how do they monitor what i’m doing? is the info sent via text or email to them? do they log into a website to view what i’ve been up to? WTH?!

Try this

To launch the application: use the phone dialer to dial 74283 and press the call button (as if you call number 74283). If the application launches, you know you have a problem.

Unfortunately, the application configuration enables the spy to change this code, so it’s not a guarantee that it will work. If you have doubts, the safest bet is to do a factory restore on your device.

Is it the spying app or no?

From No Thank You on September 27, 2012 :: 9:56 am

I dialed the number you said, and nothing happened. An automatic message from Verizon said the “feature update could not be completed”. Does this mean that it is not the spying app?

It doesn't necessarily mean the

It doesn’t necessarily mean the spy app isn’t there, since the person who installed it could have changed the code on install. However, unless you have some particular reason to think someone is spying on you, it’s highly unlikely that you have a problem.

Phone Hacking

From Dushyant Sarvaiya on July 19, 2012 :: 4:08 am

hi all, I am feeling that my boss has hacked my phone and is constantly viewing all I do over the phone.

Its a company phone so fine he may check my official company usage. But can he also check what websites I run and data I exchange on those website if my phone is connected with wifi??

Maybe

It’s certainly possible that he or your company has installed software on your phone that can track what sites you visit. That would be the case whether you’re using cellular data or Wi-Fi. It’s possible that key-logging software would also allow them to track the data you’re sending, but that is much less likely. Since it is a company device, there’s probably nothing illegal about that. Though if it were to do more, such as capture video and/or sound through the camera without your knowledge, that may violate privacy/wiretapping laws. (lawyers, feel free to comment further)

As a general policy, it’s safest to assume that your company is tracking every site you visit on their devices/network and email you send through company accounts and act accordingly.

Boyfriend Spying On Me!

From Ali on July 26, 2012 :: 6:08 pm

Ok… Not that I am defending myself, I am not doing anything wrong… however, if I can;t even have a conversation with my Mother,talkng about how much of a jerk he is, only to turn around and have my boyfriend come home all mad at me ( for no reason… hmmm ) my phones battery is completely drained after only an hour! Ugh! Please help!